Everybody likes checklists; they represent activities you can say you completed, check them off and they are done. That is just not true for cybersecurity because of its fluid nature. However, I'll present a pseudo checklist which represents major areas .....